Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Avery Products Corporation is warning it suffered a data breach after its website was hacked to steal customers' credit cards and personal information. [...]
Source: BleepingComputer
January 15th, 2025 (3 months ago)
Description: The University of Oklahoma (OU) has confirmed that unusual activity has been detected on its IT network following claims by the Fog ransomware group that it had infiltrated the university's systems. Fog, a relatively new player in the ransomware landscape, listed OU on its dark web leak site on January 14, 2025, claiming to have … The post University of Oklahoma Probes Breach After Ransomware Claims appeared first on CyberInsider.
Source: CyberInsider
January 15th, 2025 (3 months ago)
Description: Summary Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. Affected Version Gradio <= 5.6.0 Impact Unauthorized Access: Sensitive files or directories specified in blocked_paths can be accessed by attackers. Data Exposure: Critical files, such as configuration files or user data, may be leaked. Security Breach: This can lead to broader application or system compromise if sensitive files contain credentials or API keys. Root Cause The blocked_paths parameter in Gradio block's initial configuration is designed to restrict user access to specific files or directories in the local file system. However, it does not account for case-insensitive operating systems, such as Windows and macOS. This oversight enables attackers to bypass ACL restrictions by changing the case of file paths. Vulner...
Source: Github Advisory Database (PIP)
January 14th, 2025 (3 months ago)
Description: ​Attackers are exploiting a new authentication bypass zero-day vulnerability in FortiOS and FortiProxy to hijack Fortinet firewalls and breach enterprise networks. [...]
Source: BleepingComputer
January 14th, 2025 (3 months ago)
Description: A recently uncovered malware campaign has compromised over 5,000 WordPress websites worldwide, utilizing malicious scripts to create unauthorized admin accounts, install backdoors via rogue plugins, and exfiltrate sensitive data. The attack, linked to the domain wp3[.]xyz, was first detected and blocked by the security service c/side, though the exact method of entry remains under investigation. … The post Massive Malware Campaign Breached 5,000 WordPress Websites appeared first on CyberInsider.
Source: CyberInsider
January 14th, 2025 (3 months ago)
Description: In January 2025, stealer logs with 71M email addresses were added to HIBP. Consisting of email address, password and the website the credentials were entered against, this breach marks the launch of a new HIBP feature enabling the retrieval of the specific websites the logs were collected against. The incident also resulted in 106M more passwords being added to the Pwned Passwords service.
Source: HaveIBeenPwnedLatestBreaches
January 13th, 2025 (3 months ago)
Description: Path of Exile 2 developers confirmed that a hacked admin account allowed a threat actor to change the password and access at least 66 accounts, finally explaining how PoE 2 accounts have been breached since November. [...]
Source: BleepingComputer
January 13th, 2025 (3 months ago)
Description: New insights into the Gravy Analytics data breach reveal the vast extent of the company’s location-tracking operations and the potential for user de-anonymization. The leaked data, part of a 10 TB dataset, exposes the granular details of individuals’ movements and raises fresh concerns about the security and ethics of location data collection. Looking into the … The post Leaked Gravy Analytics Data Expose Scale of Location Tracking appeared first on CyberInsider.
Source: CyberInsider
January 13th, 2025 (3 months ago)
Description: Nominet, the official .UK domain registry and one of the largest country code registries, has confirmed that its network was breached two weeks ago using an Ivanti VPN zero-day vulnerability. [...]
Source: BleepingComputer
January 13th, 2025 (3 months ago)
Description: The Hellcat ransomware group has stolen roughly 5,000 documents, potentially containing confidential information, from the telecom giant's internal database.
Source: Dark Reading
January 13th, 2025 (3 months ago)